-
2
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant, "Privacy-Preserving Data Mining, " Proc. SIGMOD, pp. 439-450, 2000.
-
(2000)
Proc. SIGMOD
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
85012236181
-
A framework for clustering evolving data streams
-
C. C. Aggarwal, J. Han, J. Wang, and P. S. Yu, "A Framework for Clustering Evolving Data Streams, " Proc. Int'l Conf. Very Large Databases (VLDB), pp. 81-92, 2003.
-
(2003)
Proc. Int'l Conf. Very Large Databases (VLDB)
, pp. 81-92
-
-
Aggarwal, C.C.1
Han, J.2
Wang, J.3
Yu, P.S.4
-
6
-
-
34250661905
-
Achieving anonymity via clustering
-
DOI 10.1145/1142351.1142374, Proceedings of the Twenty-Fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2006
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu, "Achieving Anonymity via Clustering, " Proc. Symp. Principles of Database Systems (PODS), pp. 153-162, 2006. (Pubitemid 46946477)
-
(2006)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
9
-
-
33750732631
-
Secure anonymization for incremental datasets
-
Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings
-
J. W. Byun, Y. Sohn, E. Bertino, and N. Li, "Secure Anonymization for Incremental Data Sets, " Proc. Very Large Databases (VLDB) Workshop Secure Data Management, pp. 48-63, 2006. (Pubitemid 44699622)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 48-63
-
-
Byun, J.-W.1
Sohn, Y.2
Bertino, E.3
Li, N.4
-
10
-
-
38049126170
-
Efficient k-anonymization using clustering techniques
-
J. W. Byun, A. Kamra, E. Bertino, and N. Li, "Efficient k-Anonymization Using Clustering Techniques, " Proc. Database Systems for Advanced Applications (DASFAA), pp. 188-200, 2007.
-
(2007)
Proc. Database Systems for Advanced Applications (DASFAA)
, pp. 188-200
-
-
Byun, J.W.1
Kamra, A.2
Bertino, E.3
Li, N.4
-
11
-
-
52649103915
-
CASTLE: A delay-constrained scheme for k s-anonymizing data streams
-
Poster Paper
-
J. Cao, B. Carminati, E. Ferrari, and K. L. Tan, "CASTLE: A Delay-Constrained Scheme for k s-Anonymizing Data Streams, " Proc. Int'l Conf. Data Eng. (ICDE), Poster Paper, pp. 1376-1378, 2008.
-
(2008)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 1376-1378
-
-
Cao, J.1
Carminati, B.2
Ferrari, E.3
Tan, K.L.4
-
13
-
-
65449158881
-
Categorizing and mining concept drifting data streams
-
P. Zhang, X. Zhu, and Y. Shi, "Categorizing and Mining Concept Drifting Data Streams, " Proc. Int'l Conf. Knowledge Discovery and Data Mining (KDD), pp. 812-820, 2008.
-
(2008)
Proc. Int'l Conf. Knowledge Discovery and Data Mining (KDD)
, pp. 812-820
-
-
Zhang, P.1
Zhu, X.2
Shi, Y.3
-
14
-
-
29844440052
-
A native extension of SQL for mining data streams
-
DOI 10.1145/1066157.1066271, SIGMOD 2005: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
C. Luo, H. Thakkar, H. Wang, and C. Zaniolo, "A Native Extension of SQL for Mining Data Streams, " Proc. SIGMOD, pp. 873-875, 2005. (Pubitemid 43038994)
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 873-875
-
-
Luo, C.1
Thakkar, H.2
Wang, H.3
Zaniolo, C.4
-
15
-
-
26944448516
-
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
-
DOI 10.1007/s10618-005-0007-5
-
J. Domingo-Ferrer and V. Torra, "Ordinal, Continuous and Heterogeneous k-Anonymity through Microaggregation, " Data Mining and Knowledge Discovery, vol. 11, no. 2, pp. 195-212, 2005. (Pubitemid 41476765)
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
16
-
-
37649020602
-
A polynomial-time approximation to optimal multivariate microaggregation
-
J. Domingo-Ferrer, F. Sebe, and A. Solanas, "A Polynomial-Time Approximation to Optimal Multivariate Microaggregation, " Computers and Math. with Applications, vol. 55, no. 4, pp. 714-732, 2008.
-
(2008)
Computers and Math. with Applications
, vol.55
, Issue.4
, pp. 714-732
-
-
Domingo-Ferrer, J.1
Sebe, F.2
Solanas, A.3
-
18
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Proceedings - 21st International Conference on Data Engineering, ICDE 2005
-
B. C. M. Fung, K. Wang, and P. S. Yu, "Top-Down Specialization for Information and Privacy Preservation, " Proc. Int'l Conf. Data Eng. (ICDE), pp. 205-216, 2005. (Pubitemid 41731132)
-
(2005)
Proceedings - International Conference on Data Engineering
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
21
-
-
29844444250
-
Incognito: Efficient full-domain K-anonymity
-
DOI 10.1145/1066157.1066164, SIGMOD 2005: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, "Incognito: Efficient Full-Domain k-Anonymity, " Proc. SIGMOD, pp. 49-60, 2005. (Pubitemid 43038916)
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
22
-
-
33749606641
-
Mondrian multidimensional K-anonymity
-
DOI 10.1109/ICDE.2006.101, 1617393, Proceedings of the 22nd International Conference on Data Engineering, ICDE '06
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, "Mondrian Multidimensional K-Anonymity, " Proc. Int'l Conf. Data Eng. (ICDE), p. 25, 2006. (Pubitemid 44539817)
-
(2006)
Proceedings - International Conference on Data Engineering
, vol.2006
, pp. 25
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
23
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and'-diversity
-
N. Li and T. Li, "t-Closeness: Privacy beyond k-Anonymity and'-Diversity, " Proc. Int'l Conf. Data Eng. (ICDE), pp. 106-115, 2007.
-
(2007)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 106-115
-
-
Li, N.1
Li, T.2
-
24
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "L-Diversity: Privacy beyond k-Anonymity, " Proc. Int'l Conf. Data Eng. (ICDE), p. 24, 2006.
-
(2006)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
26
-
-
46649101105
-
Maintaining k-anonymity against incremental updates
-
J. Pei, J. Xu, Z. Wang, W. Wang, and K. Wang, "Maintaining K-Anonymity against Incremental Updates, " Proc. Int'l Conf. Scientific and Statistical Database Management (SSDBM), p. 5, 2007.
-
(2007)
Proc. Int'l Conf. Scientific and Statistical Database Management (SSDBM)
, pp. 5
-
-
Pei, J.1
Xu, J.2
Wang, Z.3
Wang, W.4
Wang, K.5
-
27
-
-
54049092431
-
Protecting business intelligence and customer privacy while outsourcing data mining tasks
-
L. Qiu, Y. Li, and X. Wu, "Protecting Business Intelligence and Customer Privacy While Outsourcing Data Mining Tasks, " Knowledge and Information Systems, vol. 17, no. 1, pp. 99-120, 2008.
-
(2008)
Knowledge and Information Systems
, vol.17
, Issue.1
, pp. 99-120
-
-
Qiu, L.1
Li, Y.2
Wu, X.3
-
28
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
DOI 10.1142/S021848850200165X
-
L. Sweeney, "Achieving k-Anonymity Privacy Protection Using Generalization and Suppression, " Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, vol. 10, pp. 571-588, 2002. (Pubitemid 35384858)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
29
-
-
35248876111
-
K-anonymization incremental maintenance and optimization techniques
-
DOI 10.1145/1244002.1244093, Proceedings of the 2007 ACM Symposium on Applied Computing
-
T. M. Truta and A. Campan, "k-Anonymization Incremental Maintenance and Optimization Techniques, " Proc. ACM Symp. Applied Computing (SAC), pp. 380-387, 2007. (Pubitemid 47568319)
-
(2007)
Proceedings of the ACM Symposium on Applied Computing
, pp. 380-387
-
-
Truta, T.M.1
Campan, A.2
-
30
-
-
35448967088
-
M-invariance: Towards privacy preserving re-publication of dynamic datasets
-
DOI 10.1145/1247480.1247556, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
X. Xiao and Y. Tao, "M-Invariance: Towards Privacy Preserving Re-Publication of Dynamic Data Sets, " Proc. SIGMOD, pp. 689-700, 2007. (Pubitemid 47630845)
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
31
-
-
70350635180
-
Approximation bounds for minimum information loss microaggregation
-
Nov
-
M. Laszlo and S. Mukherjee, "Approximation Bounds for Minimum Information Loss Microaggregation, " IEEE Trans. Knowledge and Data Eng., vol. 21, no. 11, pp. 1643-1647, Nov. 2009.
-
(2009)
IEEE Trans. Knowledge and Data Eng.
, vol.21
, Issue.11
, pp. 1643-1647
-
-
Laszlo, M.1
Mukherjee, S.2
-
32
-
-
84988315609
-
Fast data anonymization with low information loss
-
G. Ghinita, P. Karras, P. Kalnis, and N. Mamoulis, "Fast Data Anonymization with Low Information Loss, " Proc. Int'l Conf. Very Large Databases (VLDB), pp. 758-769, 2007.
-
(2007)
Proc. Int'l Conf. Very Large Databases (VLDB)
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
|